Verification Across Intellectual Property Boundaries.

In many industries, the share of software components provided by third-party suppliers is steadily increasing. As the suppliers seek to secure their intellectual property (IP) rights, the customer usually has no direct access to the suppliers' source code, and is able to enforce the use of veri...

Olles dieđut

Bibliográfalaš dieđut
Váldodahkkit: Chaki, S, Schallhart, C, Veith, H
Eará dahkkit: Damm, W
Materiálatiipa: Journal article
Giella:English
Almmustuhtton: Springer 2007
_version_ 1826260899922444288
author Chaki, S
Schallhart, C
Veith, H
author2 Damm, W
author_facet Damm, W
Chaki, S
Schallhart, C
Veith, H
author_sort Chaki, S
collection OXFORD
description In many industries, the share of software components provided by third-party suppliers is steadily increasing. As the suppliers seek to secure their intellectual property (IP) rights, the customer usually has no direct access to the suppliers' source code, and is able to enforce the use of verification tools only by legal requirements. In turn, the supplier has no means to convince the customer about successful verification without revealing the source code. This paper presents a new approach to resolve the conflict between the IP interests of the supplier and the quality interests of the customer. We introduce a protocol in which a dedicated server (called the "amanat") is controlled by both parties: the customer controls the verification task performed by the amanat, while the supplier controls the communication channels of the amanat to ensure that the amanat does not leak information about the source code. We argue that the protocol is both practically useful and mathematically sound. As the protocol is based on well-known (and relatively lightweight) cryptographic primitives, it allows a straightforward implementation on top of existing verification tool chains. To substantiate our security claims, we establish the correctness of the protocol by cryptographic reduction proofs. © Springer-Verlag Berlin Heidelberg 2007.
first_indexed 2024-03-06T19:13:04Z
format Journal article
id oxford-uuid:176b8c9c-c9c1-4f2c-ad23-2ed93ca22b05
institution University of Oxford
language English
last_indexed 2024-03-06T19:13:04Z
publishDate 2007
publisher Springer
record_format dspace
spelling oxford-uuid:176b8c9c-c9c1-4f2c-ad23-2ed93ca22b052022-03-26T10:37:10ZVerification Across Intellectual Property Boundaries.Journal articlehttp://purl.org/coar/resource_type/c_dcae04bcuuid:176b8c9c-c9c1-4f2c-ad23-2ed93ca22b05EnglishSymplectic Elements at OxfordSpringer2007Chaki, SSchallhart, CVeith, HDamm, WHermanns, HIn many industries, the share of software components provided by third-party suppliers is steadily increasing. As the suppliers seek to secure their intellectual property (IP) rights, the customer usually has no direct access to the suppliers' source code, and is able to enforce the use of verification tools only by legal requirements. In turn, the supplier has no means to convince the customer about successful verification without revealing the source code. This paper presents a new approach to resolve the conflict between the IP interests of the supplier and the quality interests of the customer. We introduce a protocol in which a dedicated server (called the "amanat") is controlled by both parties: the customer controls the verification task performed by the amanat, while the supplier controls the communication channels of the amanat to ensure that the amanat does not leak information about the source code. We argue that the protocol is both practically useful and mathematically sound. As the protocol is based on well-known (and relatively lightweight) cryptographic primitives, it allows a straightforward implementation on top of existing verification tool chains. To substantiate our security claims, we establish the correctness of the protocol by cryptographic reduction proofs. © Springer-Verlag Berlin Heidelberg 2007.
spellingShingle Chaki, S
Schallhart, C
Veith, H
Verification Across Intellectual Property Boundaries.
title Verification Across Intellectual Property Boundaries.
title_full Verification Across Intellectual Property Boundaries.
title_fullStr Verification Across Intellectual Property Boundaries.
title_full_unstemmed Verification Across Intellectual Property Boundaries.
title_short Verification Across Intellectual Property Boundaries.
title_sort verification across intellectual property boundaries
work_keys_str_mv AT chakis verificationacrossintellectualpropertyboundaries
AT schallhartc verificationacrossintellectualpropertyboundaries
AT veithh verificationacrossintellectualpropertyboundaries